EP1345386A2 - Method of controlling network access in wireless environment and recording medium therefor - Google Patents
Method of controlling network access in wireless environment and recording medium therefor Download PDFInfo
- Publication number
- EP1345386A2 EP1345386A2 EP03250931A EP03250931A EP1345386A2 EP 1345386 A2 EP1345386 A2 EP 1345386A2 EP 03250931 A EP03250931 A EP 03250931A EP 03250931 A EP03250931 A EP 03250931A EP 1345386 A2 EP1345386 A2 EP 1345386A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- password
- authentication
- key
- authentication server
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/71—Hardware identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present invention relates to a method of controlling an access to a network and protecting communication data in a wireless environment, and more particularly, to an access controlling method using a combination of a wireless local area network (hereinafter referred to as WLAN) terminal authentication and a user authentication.
- WLAN wireless local area network
- WLANs are LANs that transmit and receive data over the air without the need for wired connections, using electromagnetic airwaves, radio and infrared, between computers or between a computer and a communication system other than a computer.
- WLANs have been developed with the recent rapid advancements of Internet services and wireless communication technologies. Because WLANs are easily installed and maintained, they are increasingly used for network connections between buildings or in places where wired network establishments are difficult, such as, large-scale offices or distribution centers. However, WLANs provide poor security compared with wired networks because, theoretically, anybody can access the transmission medium.
- An authentication mechanism in a conventional IEEE802.11b system is classified into an open-system authentication mechanism and a shared-key authentication mechanism. Only the shared-key authentication mechanism performs authentication using an actual key.
- the open-system authentication mechanism uses an empty character stream opened upon a WLAN card authentication based on an access point.
- the access point can be connected to a WLAN card device after unconditionally authenticating the card device, even though the card device does not provide accurate authentication information.
- a particular character stream proposed by an access point to a WLAN card in a challenge procedure is coded into a predetermined key in a response procedure through the challenge-response communication using a shared key pre-determined before resuming communications. Then, the coded character stream can be connected to an access point only if it passes the authentication procedure to obtain an authentication to be transmitted from the WLAN card to the access point.
- an IEEE802.11b system a terminal authenticates itself to an access point using a WEP supplied by a media access control (MAC) layer.
- MAC media access control
- an IEEE802.11a system can adopt an authentication method using a WEP or a method of defining an authentication protocol in an IEEE802.1X environment identical to or superior to the MAC layer.
- An authentication protocol using a WEP is based on a challenge-response method using algorithms for challenge and response procedures.
- a terminal codes a challenge received at an access point using a shared key and a WEP and transmits the code to the access point
- the access point decodes the challenge using a previously shared key, thereby authenticating the challenger.
- the authentication protocol using WEP is not safe at all against attacks made on a current WEP algorithm.
- the other authentication method proposed by an IEEE802.11a system is to authenticate a terminal on a level equal to or higher than an MAC layer.
- This authentication method is based on an authentication protocol using an extensible authentication protocol (EAP) in an IEEE802.1X environment, but requires a concrete authentication protocol in order to perform authentication at the same level as or higher one than the MAC layer.
- EAP extensible authentication protocol
- the IEEE802.1X environment does not define a concrete authentication protocol.
- the proposed concrete authentication protocol can be applied to provide a terminal authentication function.
- a security service based on the terminal authentication an unauthorized user that acquired a terminal may access a network although he or she is not the original owner of the terminal. That is, access of users to an enterprise network and a public access service must be controlled.
- Next-generation terminals provide accesses to several wireless links. When these accesses are realized within a terminal, authentications for several wireless accesses are required. In order to receive a mutual exchange service of several wireless accesses, a terminal must support authentication for the mutual wireless access. To achieve this, wireless access techniques require an independent mechanism.
- an authentication method using a password is widely used because of the convenience of usage.
- general authentication systems using a password provide a low degree of freedom for a user to select a password.
- a password having a size of k bits is selected, and a probability that each of the k bits is 0 or 1 is 0.5, the k-bit password becomes an arbitrary random key. Guessing the random key means making a list of 2 k random password candidates.
- random selection is almost impossible, and thus the user is exposed to an off-line password guessing attack.
- a network access controlling method In this method, first, an access point completes authenticating a terminal using an MAC-ID. Next, a user inputs a password to a password authentication client. Then, the authentication between the password authentication client and an authentication server is performed based on the input password. Thereafter, the terminal accesses an external/internal network (e.g., Internet/Intranet) if the authentication of terminal and the authentication based on the password are approved. Otherwise, the terminal transmits an authentication failure message to the user.
- an external/internal network e.g., Internet/Intranet
- the present invention provides a network access controlling method having improved security compared with a conventional method, by using both terminal authentication and user authentication in a place requiring authentication as a way of controlling network accesses through a terminal, such as, in a wireless local area network service, and a recording medium storing the software codes of the network access controlling method.
- the terminal authentication can be performed in an IEEE802.1X environment.
- the terminal is assigned an Internet Protocol (IP) address and then, it downloads the password authentication client from the authentication server.
- IP Internet Protocol
- the present invention relates to a method of allowing a user's access to a network through "user authentication in a broad meaning".
- the user authentication in a broad meaning can be considered embracing both a method of controlling a user's access to a network by authenticating the terminal used by the user and a method of authenticating the user.
- the method of controlling a user's access to a network through terminal authentication is performed in a situation when the user has his or her dedicated terminal such as a mobile phone.
- the terminal of the user has its unique identifier.
- the network authenticates the terminal using the identifier of the terminal. Accordingly, the user can access the network. In this method, the user can easily access the network without participating in the authentication process.
- the network access control through only terminal authentication causes a security problem. Any person that acquires the terminal can be allowed to access the network through the terminal authentication. That is, an unauthorized user can access the network through other people's terminals.
- the terminal authentication is based on the identifier of a terminal, such that it depends a lot on the wireless link access technique of the terminal and cannot use other wireless link access techniques.
- the user authentication is used to control a user's access to a network by authenticating the user regardless of which terminal the user uses.
- This user authentication has a disadvantage in that the user must undergo an authentication process.
- the user authentication is important in directly authenticating the user who actually works on a network.
- a user can be authenticated regardless of terminals and wireless link access techniques.
- the present invention is characterized in that user authentication is based on the password known by a user. Also, network access can be easily controlled at a user level.
- the invention relates to a method of operating the password authentication client, a method of operating the password authentication server, a computer program for carrying out the methods, the password authentication client and the password authentication server.
- the present invention includes a step of authenticating a terminal possessed by a user and a step of authenticating the user using a password that the user knows.
- the main bodies of actions which are a terminal, an access point, and an authentication server existing in a network, are required for the user authentication according to the present invention.
- FIG. 1 shows the components of a WLAN environment.
- terminals 100a and 100b have MAC protocol stacks 10a and 10b (e.g., IEEE802.11), respectively, and have frameworks 20a and 20b (e.g., IEEE802.1X), respectively, on the second layer.
- the MAC protocol stacks 10a and 10b are capable of accessing a wireless link, and the frameworks 20a and 20b enable authentication of a terminal.
- the terminals 100a and 100b include processors (not shown) for receiving a password from a user and processing the received password.
- the terminal 100a and an access point 120a constitute a first wireless network
- the terminal 100b and an access point 120b constitute a second wireless network.
- the terminals 100a and 100b cannot access a host in a wired network without being authenticated by the access points 120a and 120b.
- the manner in which the access points 120a and 120b process the packets of the terminals 100a and 100b differs depending on where the authentication is performed. For example, in an IEEE802.1X environment, authentication-related packets sent by the terminals 100a and 100b are transmitted to an authentication server 140 in the wired network without undergoing authentication by the access points 120a and 120b.
- the access points 120a and 120b are required to access a wired network by wireless, and send an authentication-related packet using a password, which is used in the present invention, to the authentication server 140 in the wired network without any processing.
- an access point can simply perform an authentication server function, or can transmit an authentication-related packet to the authentication server 140 while an authentication server in a LAN is assigned to perform a local authentication function.
- the authentication server 140 processes authentication messages requested by the terminals 100a and 100b, and stores the session information from the terminals 100a and 100b, the session information with which a user can be charged. That is, the authentication server 140 has the personal information regarding users and records information on the contents of services used by users.
- a reference numeral 150 denotes a portal.
- a method of controlling user's access to a network is composed of two steps. First, an authentication for a terminal is performed. Next, an authentication for the user of the terminal is performed using a password, in step 300. The authentication for the user of a terminal using a password is performed after the following preparatory operations in step 200.
- the primitive element g for the mod n is obtained by selecting the arbitrary large prime number n.
- n and g correspond to information shared by a user terminal and an authentication server.
- h( ") is a unidirectional hash function.
- the user transmits the value of the password verifier v to the authentication server via a safe channel.
- step 300 for network access A process in which the user acquires a terminal for the first time and gains authentication from the authentication server will now be described. If the user is not the first user in a certain domain, the fourth sub-step in step 300 for network access can be omitted.
- authentication of a terminal is completed using an MAC-ID in an IEEE802.1X environment.
- IP Internet Protocol
- DHCP dynamic host configuration protocol
- the address of the authentication server is brought.
- the authentication server downloads a password authentication client.
- a user inputs his or her password to the password authentication client.
- authentication between the password authentication client and the authentication server is completed based on the input password.
- the terminal accesses an external/internal network, such as Internet/Intranet, after authentication is approved.
- an external/internal network such as Internet/Intranet
- Step 200 (password registration and preparatory operations) must be performed before the sixth sub-step for authentication.
- the password authentication client produces three random values x A , c A , and r.
- the password authentication client transmits the values z 1 , y A , and r to the authentication server via an access point.
- the length of a required key differs according to a symmetric key encoding system used, but the length of a key required by the password verifier can start from the most significant bit (MSB).
- a required key length starting from the MSB of y B is obtained according to the used symmetric key encoding system.
- new secrete information enabling encryption communications is shared by the user and the authentication server.
- a user can be authenticated using a password in the WLAN environment. Regardless of several wireless accesses, a user can be authenticated, such that a terminal can be authenticated even when it roams over a variety of networks.
- MAC-ID media access control identifier
- PKI public key infrastructure
- IKE Internet key exchange
- IPSec IP security
- the present invention uses a password-dependent authentication method, so that an authentication system can be easily established without the PKI.
- the present invention it is possible to check whether a user has the same key as that of an authentication server. Communication data is safe from password attacks worked in a conventional system using a general password. Authentication of a terminal and authentication of a user are independently performed. Shared secret information, with which encoding communications are performed after authentication, is provided. A key known in a session does not include information on a key used in other sessions. Authentication is efficiently performed.
- a protocol for mutual authentication and key exchange between a user and an authentication server mainly performs a hash function and a symmetric encoding algorithm except when each host performs modular exponentiation one time to achieve a Diffe-Hellman key exchange. Thus, fast authentication and key exchange are realized.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
- The present invention relates to a method of controlling an access to a network and protecting communication data in a wireless environment, and more particularly, to an access controlling method using a combination of a wireless local area network (hereinafter referred to as WLAN) terminal authentication and a user authentication.
- Generally, WLANs are LANs that transmit and receive data over the air without the need for wired connections, using electromagnetic airwaves, radio and infrared, between computers or between a computer and a communication system other than a computer. WLANs have been developed with the recent rapid advancements of Internet services and wireless communication technologies. Because WLANs are easily installed and maintained, they are increasingly used for network connections between buildings or in places where wired network establishments are difficult, such as, large-scale offices or distribution centers. However, WLANs provide poor security compared with wired networks because, theoretically, anybody can access the transmission medium.
- In this regard, there are a lot of security services, such as encryption, access control, authentication, non-repudiation, integrity, or the like. All of them are important, but the authentication function is particularly important in respect of providing quality communication services. In a WLAN, proper authentication is first performed before encryption and access control. An authentication with respect to a terminal is necessarily required for public regions or enterprises to provide a WLAN service and charge users. However, in a WLAN system, the security function of a mechanism for authentication using an existing wired equivalent privacy (WEP) does not work against many attacks.
- An authentication mechanism in a conventional IEEE802.11b system is classified into an open-system authentication mechanism and a shared-key authentication mechanism. Only the shared-key authentication mechanism performs authentication using an actual key. The open-system authentication mechanism uses an empty character stream opened upon a WLAN card authentication based on an access point. The access point can be connected to a WLAN card device after unconditionally authenticating the card device, even though the card device does not provide accurate authentication information. In the shared-key authentication mechanism, a particular character stream proposed by an access point to a WLAN card in a challenge procedure is coded into a predetermined key in a response procedure through the challenge-response communication using a shared key pre-determined before resuming communications. Then, the coded character stream can be connected to an access point only if it passes the authentication procedure to obtain an authentication to be transmitted from the WLAN card to the access point.
- In an IEEE802.11b system, a terminal authenticates itself to an access point using a WEP supplied by a media access control (MAC) layer. In order to authenticate a terminal to an access point by improving an existing authentication mechanism, an IEEE802.11a system can adopt an authentication method using a WEP or a method of defining an authentication protocol in an IEEE802.1X environment identical to or superior to the MAC layer.
- An authentication protocol using a WEP is based on a challenge-response method using algorithms for challenge and response procedures. In this method, when a terminal codes a challenge received at an access point using a shared key and a WEP and transmits the code to the access point, the access point decodes the challenge using a previously shared key, thereby authenticating the challenger. However, the authentication protocol using WEP is not safe at all against attacks made on a current WEP algorithm.
- The other authentication method proposed by an IEEE802.11a system is to authenticate a terminal on a level equal to or higher than an MAC layer. This authentication method is based on an authentication protocol using an extensible authentication protocol (EAP) in an IEEE802.1X environment, but requires a concrete authentication protocol in order to perform authentication at the same level as or higher one than the MAC layer. The IEEE802.1X environment does not define a concrete authentication protocol.
- If the IEEE802.1X environment proposes a concrete authentication protocol, the proposed concrete authentication protocol can be applied to provide a terminal authentication function. However, according to a security service based on the terminal authentication, an unauthorized user that acquired a terminal may access a network although he or she is not the original owner of the terminal. That is, access of users to an enterprise network and a public access service must be controlled.
- Next-generation terminals provide accesses to several wireless links. When these accesses are realized within a terminal, authentications for several wireless accesses are required. In order to receive a mutual exchange service of several wireless accesses, a terminal must support authentication for the mutual wireless access. To achieve this, wireless access techniques require an independent mechanism.
- In order to authenticate a user, an authentication method using a password is widely used because of the convenience of usage. However, general authentication systems using a password provide a low degree of freedom for a user to select a password. When a password having a size of k bits is selected, and a probability that each of the k bits is 0 or 1 is 0.5, the k-bit password becomes an arbitrary random key. Guessing the random key means making a list of 2k random password candidates. However, when a user selects a password, random selection is almost impossible, and thus the user is exposed to an off-line password guessing attack.
- According to the present invention, there is provided a network access controlling method. In this method, first, an access point completes authenticating a terminal using an MAC-ID. Next, a user inputs a password to a password authentication client. Then, the authentication between the password authentication client and an authentication server is performed based on the input password. Thereafter, the terminal accesses an external/internal network (e.g., Internet/Intranet) if the authentication of terminal and the authentication based on the password are approved. Otherwise, the terminal transmits an authentication failure message to the user.
- The present invention provides a network access controlling method having improved security compared with a conventional method, by using both terminal authentication and user authentication in a place requiring authentication as a way of controlling network accesses through a terminal, such as, in a wireless local area network service, and a recording medium storing the software codes of the network access controlling method.
- The terminal authentication can be performed in an IEEE802.1X environment.
- If the user is the original possessor of the terminal, after the user authentication step and before the password inputting step, the terminal is assigned an Internet Protocol (IP) address and then, it downloads the password authentication client from the authentication server.
- In preparatory operations for the password inputting step, first, an arbitrary large prime number n is selected and a primitive element g for a mod n is obtained, so that they serve as information shared by the terminal and the authentication server. Then, the user selects his or her password P to calculate a password verifier v (v=gh(P)). Next, the user transmits the password verifier value to the authentication server via a safe channel. Here, h( ") denotes a unidirectional hash function.
- The present invention relates to a method of allowing a user's access to a network through "user authentication in a broad meaning". The user authentication in a broad meaning can be considered embracing both a method of controlling a user's access to a network by authenticating the terminal used by the user and a method of authenticating the user.
- The method of controlling a user's access to a network through terminal authentication is performed in a situation when the user has his or her dedicated terminal such as a mobile phone. Obviously, the terminal of the user has its unique identifier. The network authenticates the terminal using the identifier of the terminal. Accordingly, the user can access the network. In this method, the user can easily access the network without participating in the authentication process. However, the network access control through only terminal authentication causes a security problem. Any person that acquires the terminal can be allowed to access the network through the terminal authentication. That is, an unauthorized user can access the network through other people's terminals. Also, the terminal authentication is based on the identifier of a terminal, such that it depends a lot on the wireless link access technique of the terminal and cannot use other wireless link access techniques.
- On the other hand, the user authentication is used to control a user's access to a network by authenticating the user regardless of which terminal the user uses. This user authentication has a disadvantage in that the user must undergo an authentication process. However, the user authentication is important in directly authenticating the user who actually works on a network. In the user authentication, a user can be authenticated regardless of terminals and wireless link access techniques. The present invention is characterized in that user authentication is based on the password known by a user. Also, network access can be easily controlled at a user level.
- In other aspects, the invention relates to a method of operating the password authentication client, a method of operating the password authentication server, a computer program for carrying out the methods, the password authentication client and the password authentication server.
- The features and advantages of the present invention will become more apparent by describing in detail a preferred embodiment thereof with reference to the attached drawings in which:
- FIG. 1 is a block diagram illustrating a network access controlling method according to the present invention; and
- FIG. 2 is a flowchart illustrating a network access controlling method according to the present invention.
-
- The present invention will now be described more fully with reference to the accompanying drawings, in which a preferred embodiment of the invention is shown. This invention may, however, be embodied in different forms and should not be construed as limited to the embodiment set forth herein. Rather, the embodiment is provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
- For user authentication, the present invention includes a step of authenticating a terminal possessed by a user and a step of authenticating the user using a password that the user knows. Also, the main bodies of actions, which are a terminal, an access point, and an authentication server existing in a network, are required for the user authentication according to the present invention. FIG. 1 shows the components of a WLAN environment.
- Referring to FIG. 1,
terminals MAC protocol stacks 10a and 10b (e.g., IEEE802.11), respectively, and haveframeworks 20a and 20b (e.g., IEEE802.1X), respectively, on the second layer. TheMAC protocol stacks 10a and 10b are capable of accessing a wireless link, and theframeworks 20a and 20b enable authentication of a terminal. Theterminals access point 120a constitute a first wireless network, and the terminal 100b and anaccess point 120b constitute a second wireless network. Theterminals access points access points terminals terminals authentication server 140 in the wired network without undergoing authentication by theaccess points - The access points 120a and 120b are required to access a wired network by wireless, and send an authentication-related packet using a password, which is used in the present invention, to the
authentication server 140 in the wired network without any processing. In the IEEE802.1X environment, an access point can simply perform an authentication server function, or can transmit an authentication-related packet to theauthentication server 140 while an authentication server in a LAN is assigned to perform a local authentication function. - The
authentication server 140 processes authentication messages requested by theterminals terminals authentication server 140 has the personal information regarding users and records information on the contents of services used by users. - A
reference numeral 150 denotes a portal. - Basic operations and parameters required to authenticate a user using a password are as follows.
- n: arbitrary large prime number
- g: primitive element for mod n
- P: user's password
- A, B: characters representing a user and an authentication server, respectively
- v: a password verifier stored in an authentication server
- xA, xB: arbitrary private keys of a user terminal and an authentication server, respectively
- yA, yB: arbitrary public keys of a user terminal and an authentication server, respectively. Here, yA= gxA, and yB= gxB (where the uses of xA and yA are slightly different from those of a private key and a public key, respectively, which are used in a general public key coding system).
- cA: the confounder of a user terminal. A long random value is generally selected as cA.
- h( "): a unidirectional hash function
- Ex( "): a symmetric key coding algorithm in which x is used as a private key. Since x can have an arbitrary length, a coding algorithm having a key of variable size, such as Blowfish [Sch93], can be used for security, and an Advanced Encryption Standard (AES) newly established as a block coding algorithm standard by the U.S. National Institute of Standard and Technology can also be used.
- K: a session key that is shared by a user and an authentication server and can be used for encryption communications later.
-
- Referring to FIG. 2, a method of controlling user's access to a network, according to the present invention, is composed of two steps. First, an authentication for a terminal is performed. Next, an authentication for the user of the terminal is performed using a password, in
step 300. The authentication for the user of a terminal using a password is performed after the following preparatory operations instep 200. - First of all, the primitive element g for the mod n is obtained by selecting the arbitrary large prime number n. Here, n and g correspond to information shared by a user terminal and an authentication server.
- Next, a user selects his or her password P and calculates the password verifier v = gh(P). As described above, h( ") is a unidirectional hash function.
- Thereafter, the user transmits the value of the password verifier v to the authentication server via a safe channel.
- A process in which the user acquires a terminal for the first time and gains authentication from the authentication server will now be described. If the user is not the first user in a certain domain, the fourth sub-step in
step 300 for network access can be omitted. - In the first sub-step, authentication of a terminal is completed using an MAC-ID in an IEEE802.1X environment.
- In the second sub-step, an Internet Protocol (IP) address is allocated using a dynamic host configuration protocol (DHCP) server or the like.
- In the third sub-step, the address of the authentication server is brought.
- In the fourth sub-step, the authentication server downloads a password authentication client.
- In the fifth sub-step, a user inputs his or her password to the password authentication client.
- In the sixth sub-step, authentication between the password authentication client and the authentication server is completed based on the input password.
- In the seventh sub-step, the terminal accesses an external/internal network, such as Internet/Intranet, after authentication is approved.
- Hereinafter, the sixth sub-step of step 300 (network access) will be described in greater detail. Step 200 (password registration and preparatory operations) must be performed before the sixth sub-step for authentication.
- In the sixth sub-step, firstly, the password authentication client calculates a password verifier v = gh(P), based on an input password P.
- Secondly, the password authentication client produces three random values xA, cA, and r.
- Thirdly, yA = gxA and z1 = h(yA, v, cA) are calculated using the produced random values.
- Fourthly, the password authentication client transmits the values z1, yA, and r to the authentication server via an access point.
- Fifthly, the authentication server stores the received values z1 and yA and produces a random value xB to calculate yB= gxB.
- Sixthly, the authentication server calculates a session key K =yA xB and h1 = h(r, v, K), based on the received values yA and r.
- Seventhly, the authentication server transmits a message z2 =Ev (yB, h1), into which the public key yB of the authentication server and the calculated value h1 are encoded by a symmetric key encoding system by using a key induced from the password verifier v of the user, to the password authentication client. Here, the length of a required key differs according to a symmetric key encoding system used, but the length of a key required by the password verifier can start from the most significant bit (MSB).
- Eighthly, the password authentication client decodes the received encoded message z2 using the symmetric key encoding system based on a decoding key induced from the password verifier v of the user, and calculates and stores a session key K =yB xA. Thereafter, the password authentication client calculates h ' = h(r, v, K) using the calculated session key and checks whether the calculated value h ' is equal to the received value h1. If they are not equal, the password authentication client stops a message exchange with the authentication server.
- Ninthly, if h ' and h1 are equal, the password authentication client transmits, to the authentication server, a message z3 =EyB (cA, K), into which K =yB xA and cA are encoded based on a key induced from the public key yB of the authentication server. A required key length starting from the MSB of yB is obtained according to the used symmetric key encoding system.
- Tenthly, the authentication server decodes the received z3 using a key induced from yB and checks if K =yB xA is equal to K =yA xB. If they are different, the authentication server stops a message exchange with the user authentication client. If K =yB xA is equal to K =yA xB, the authentication server calculates a value h " (=h(yA, v, cA)) based on yA stored in the fifth step and the decoded cA and checks if h " is equal to z1. If they are the same, the authentication server transmits a user authentication success message to the password client. If they are different, the authentication server transmits a user authentication failure message to the password client.
- After the authentication between the password authentication client and the authentication server is completed, new secrete information enabling encryption communications is shared by the user and the authentication server.
- As described above, a user can be authenticated using a password in the WLAN environment. Regardless of several wireless accesses, a user can be authenticated, such that a terminal can be authenticated even when it roams over a variety of networks.
- The use of passwords instead of the management using a media access control identifier (MAC-ID) makes a user-level management possible and can provide an inter-technology hand off function. Mutual authentication is possible without a public key infrastructure (PKI). An Internet key exchange (IKE), which is an authentication protocol used in IP security (IPSec), must depend on the PKI or the like in order to authenticate an opposite party. However, the present invention uses a password-dependent authentication method, so that an authentication system can be easily established without the PKI.
- According to the present invention, it is possible to check whether a user has the same key as that of an authentication server. Communication data is safe from password attacks worked in a conventional system using a general password. Authentication of a terminal and authentication of a user are independently performed. Shared secret information, with which encoding communications are performed after authentication, is provided. A key known in a session does not include information on a key used in other sessions. Authentication is efficiently performed.
- A protocol for mutual authentication and key exchange between a user and an authentication server, according to the present invention, mainly performs a hash function and a symmetric encoding algorithm except when each host performs modular exponentiation one time to achieve a Diffe-Hellman key exchange. Thus, fast authentication and key exchange are realized.
Claims (10)
- A network access controlling method in a wireless environment, the method comprising:(a) an access point completing an authentication for a terminal using an MAC-ID;(b) accepting user input of a password to a password authentication client;(c) performing authentication between the password authentication client and an authentication server based on the input password; and(d) the terminal accessing an external/internal network (e.g., Internet/Intranet) if the authentication in step (a) and the authentication in step (c) are approved, or otherwise, transmitting an authentication failure message to the user.
- The network access controlling method of claim 1, wherein step (a) is performed in an IEEE802.1X environment.
- The network access controlling method of claim 1 or 2, further comprising the step, between steps (a) and (b), if the user is the original possessor of the terminal, of assigning the terminal an Internet Protocol (IP) address and downloading the password authentication client from the authentication server.
- The network access controlling method of any preceding claim, wherein step (b) comprises:(b-1) selecting an arbitrary large prime number n and obtaining a primitive element g for a mod n, the large prime number n and the primitive element g corresponding to information shared by the terminal and the authentication server;(b-2) calculating a password verifier v =gh(P) from the user-selected password P; and(b-3) transmitting the password verifier value to the authentication server via a safe channel,
- The network access controlling method of any preceding claim, wherein step (c) comprises:(c-1) the password authentication client calculating the password verifier v = gh(P) based on the input password P and a value z1 = h(yA, v, cA) wherein xA is the secret key of the terminal, and cA the confounder of the terminal;(c-2) the password authentication client transmitting the calculated value z1 a public key yA = gxA and an arbitrary value r to the authentication server via the access point;(c-3) the authentication server storing the received values z1 and yA and producing a secret key xB of the authentication server to calculate a public key of the authentication server, yB= gxB;(c-4) the authentication server calculating a session key K =yA xB, and a value h1 = h(r, v, K), based on the received values yA and r;(c-5) the authentication server transmitting a message z2 =Ev (yB, h1), into which a public key yB of the authentication server and the calculated value h1 are encoded by a symmetric key encoding system by using a key induced from the password verifier v, to the password authentication client;(c-6) the password authentication client decoding the received message z2 using the symmetric key encoding system based on a decoding key induced from the password verifier v of the user, calculating and storing the session key K =yB xA, calculating h ' = h(r, v, K) using the calculated session key, decoding the calculated value h ' , and checking whether the decoded value h ' is equal to the received value h1;(c-7) if h ' is not equal to h1, the password authentication client stopping message exchange with the authentication server, or if h ' and h1 are equal, the password authentication client transmitting, to the authentication server, a message z3 =EyB (cA, K), into which K =yB xA and cA are encoded based on a key induced from the public key yB of the authentication server;(c-8) the authentication server decoding the received value z3 using a key induced from yB and stopping message exchange with the user authentication client if K =yB xA is different from K =yA xB, or otherwise, calculating a value h " =h(yA, v, cA) based on the value yA stored in step (c-4) and the decoded cA, and checking if h " is equal to z1; and(c-9) the authentication server approving a user authentication if h " is equal to z1, or otherwise, disapproving the user authentication,
- The network access controlling method of claim 5, wherein step (c-1) comprises:(c-1-a) the password authentication client calculating the password verifier v = gh(P) based on the input password P and storing the result; and(c-1-b) the password authentication client producing three random values, i.e., the secret key xA of the terminal, the confounder cA of the terminal, and an arbitrary value r, and calculating a public key yA = gxA of the terminal and a value z1 = h(yA, v, cA) using the produced random values.
- A method of operation of a password authentication client, including:calculating a password verifier v = gh(P) based on a user input password P and a value z1 = h(yA, v, cA) wherein xA is the secret key of the terminal, and cA the confounder of the terminal;transmitting the calculated value z1, a public key yA = gxA and an arbitrary value r to an authentication server via the access point, for the authentication server to produce a secret key xB , a public key , yB= gxB, a session key K =yA xB, and a value h1 = h(r, v, K), based on the received values yA and r;accepting a message z2 =Ev (yB, h1) from the authentication server, in which the public key yB of the authentication server and the calculated value h1 are encoded by a symmetric key encoding system by using a key induced from the password verifier v, to the password authentication client;decoding the received message z2 using the symmetric key encoding system based on a decoding key induced from the password verifier v of the user, calculating and storing the session key K =yB xA, calculating h ' = h(r, v, K) using the calculated session key, decoding the calculated value h ' , and checking whether the decoded value h ' is equal to the received value h1;if h' is not equal to h1, the password authentication client stopping message exchange with the authentication server, or if h ' and h1 are equal, the password transmitting, to the authentication server, a message z3 =EyB (cA, K), into which K =yB xA and cA are encoded based on a key induced from the public key yB of the authentication server;
- A method of operation of a password authentication server, including:receiving a calculated value z1, a public key yA = gxA and an arbitrary value r from an authentication client where the password verifier v = gh(P) is based on a user input input password P and z1 = h(yA, v, cA) wherein xA is the secret key of the terminal, and cA the confounder of the terminal;storing the received values z1 and yA and producing a secret key xB of the authentication server to calculate a public key of the authentication server, yB= gxB;calculating a session key K =yA xB, and a value h1 = h(r, v, K), based on the received values yA and r;transmitting to the password authentication client a message z2 =Ev (yB, h1), into which a public key yB of the authentication server and the calculated value h1 are encoded by a symmetric key encoding system by using a key induced from the password verifier v, for the password authentication client to decode the received message z2 using the symmetric key encoding system based on a decoding key induced from the password verifier v of the user, to calculate the session key K =yB xA, to calculate h ' = h(r, v, K) using the calculated session key, to decode the calculated value h ' , and to check whether the decoded value h ' is equal to the received value h1;receiving, if h ' and h1 are equal, from the authentication client, a message z3 =EyB (cA, K), into which K =yB xA and cA are encoded based on a key induced from the public key yB of the authentication server;decoding the received value z3 using a key induced from yB and stopping message exchange with the user authentication client if K =yB xA is different from K =yA xB, or otherwise, calculating a value h " =h(yA, v, cA) based on the value yA stored in step (c-4) and the decoded cA, and checking if h " is equal to z1; andapproving a user authentication if h " is equal to z1, or otherwise, disapproving the user authentication,
- A computer readable recording medium that stores a computer program for executing the method of any preceding claim.
- An authentication client, comprising:means for accepting a user password input P;means for wireless communication with an access point; anda processor; andcode arranged to cause the processor to carry out the steps of the method of:calculating a password verifier v = gh(P) based on a user input password P and a value z1 = h(yA, v, cA) wherein xA is the secret key of the terminal, and cA the confounder of the terminal;transmitting the calculated value z1, a public key yA = gxA and an arbitrary value r to an authentication server via the access point, for the authentication server to produce a secret key xB , a public key , yB= gxB, a session key K =yA xB, and a value h1 = h(r, v, K), based on the received values yA and r;accepting a message z2 =Ev (yB, h1) from the authentication server, in which the public key yB of the authentication server and the calculated value h1 are encoded by a symmetric key encoding system by using a key induced from the password verifier v, to the password authentication client;decoding the received message z2 using the symmetric key encoding system based on a decoding key induced from the password verifier v of the user, calculating and storing the session key K =yB xA, calculating h ' = h(r, v, K) using the calculated session key, decoding the calculated value h ' , and checking whether the decoded value h ' is equal to the received value h1;if h' is not equal to h1, the password authentication client stopping message exchange with the authentication server, or if h ' and h1 are equal, the password transmitting, to the authentication server, a message z3 =EyB (cA, K), into which K =yB xA and cA are encoded based on a key induced from the public key yB of the authentication server;
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020020014276A KR100883648B1 (en) | 2002-03-16 | 2002-03-16 | Method of access control in wireless environment and recording medium in which the method is recorded |
KR2002014276 | 2002-03-16 |
Publications (3)
Publication Number | Publication Date |
---|---|
EP1345386A2 true EP1345386A2 (en) | 2003-09-17 |
EP1345386A3 EP1345386A3 (en) | 2004-02-04 |
EP1345386B1 EP1345386B1 (en) | 2007-05-23 |
Family
ID=27764648
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP03250931A Expired - Lifetime EP1345386B1 (en) | 2002-03-16 | 2003-02-14 | Method of controlling network access in wireless environment and recording medium therefor |
Country Status (6)
Country | Link |
---|---|
US (1) | US20030177350A1 (en) |
EP (1) | EP1345386B1 (en) |
JP (1) | JP3863852B2 (en) |
KR (1) | KR100883648B1 (en) |
CN (1) | CN1206838C (en) |
DE (1) | DE60313910T2 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2407940A (en) * | 2003-11-07 | 2005-05-11 | Siemens Ag | Providing secure authentication data in a wireless network |
GB2407939A (en) * | 2003-11-07 | 2005-05-11 | Siemens Ag | Authentication in a secure wireless communication system |
EP1635528A1 (en) * | 2004-09-13 | 2006-03-15 | Alcatel | A method to grant access to a data communication network and related devices |
WO2006039178A1 (en) * | 2004-09-30 | 2006-04-13 | Intel Corporation | Method, apparatus and system for maintaining a persistent wireless network connection |
FR2876521A1 (en) * | 2004-10-07 | 2006-04-14 | France Telecom | METHOD FOR AUTHENTICATING A USER, DEVICE USING SUCH A METHOD, AND SIGNALING SERVER |
EP1724974A1 (en) * | 2005-05-16 | 2006-11-22 | Alcatel | Apparatus and associated method, for providing communication access to a communication device at a network access port |
AU2004224971B2 (en) * | 2003-11-07 | 2008-11-13 | Siemens Aktiengesellschaft | A method of authentication via a secure wireless communication system |
CN100450137C (en) * | 2003-11-12 | 2009-01-07 | 华为技术有限公司 | Realizing method for mobile phone user to access to internet |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7024690B1 (en) * | 2000-04-28 | 2006-04-04 | 3Com Corporation | Protected mutual authentication over an unsecured wireless communication channel |
KR100458955B1 (en) * | 2002-04-18 | 2004-12-03 | (주) 시큐컴 | Security method for the Wireless LAN |
US20040054798A1 (en) * | 2002-09-17 | 2004-03-18 | Frank Ed H. | Method and system for providing seamless connectivity and communication in a multi-band multi-protocol hybrid wired/wireless network |
US7620027B2 (en) * | 2003-03-14 | 2009-11-17 | Canon Kabushiki Kaisha | Communication system, information processing device, connection device, and connection device designation method for designating connection device for communication device to connect to |
US7516487B1 (en) * | 2003-05-21 | 2009-04-07 | Foundry Networks, Inc. | System and method for source IP anti-spoofing security |
US7562390B1 (en) * | 2003-05-21 | 2009-07-14 | Foundry Networks, Inc. | System and method for ARP anti-spoofing security |
US20040255154A1 (en) * | 2003-06-11 | 2004-12-16 | Foundry Networks, Inc. | Multiple tiered network security system, method and apparatus |
US7876772B2 (en) | 2003-08-01 | 2011-01-25 | Foundry Networks, Llc | System, method and apparatus for providing multiple access modes in a data communications network |
US7735114B2 (en) * | 2003-09-04 | 2010-06-08 | Foundry Networks, Inc. | Multiple tiered network security system, method and apparatus using dynamic user policy assignment |
US7774833B1 (en) * | 2003-09-23 | 2010-08-10 | Foundry Networks, Inc. | System and method for protecting CPU against remote access attacks |
US8528071B1 (en) | 2003-12-05 | 2013-09-03 | Foundry Networks, Llc | System and method for flexible authentication in a data communications network |
KR100674632B1 (en) * | 2004-07-16 | 2007-01-26 | 재단법인서울대학교산학협력재단 | Mobile Code Authentication Schemes that Permit Overlapping of Execution and Downloading |
US20060059538A1 (en) * | 2004-09-13 | 2006-03-16 | Xcomm Box, Inc. | Security system for wireless networks |
WO2006039771A1 (en) * | 2004-10-12 | 2006-04-20 | Bce Inc. | System and method for access control |
KR100600605B1 (en) * | 2004-11-03 | 2006-07-13 | 한국전자통신연구원 | Apparatus and method for user and terminal data management of portable internet system |
FR2877453A1 (en) * | 2004-11-04 | 2006-05-05 | France Telecom | SECURE DELEGATION METHOD OF CALCULATING A BILINE APPLICATION |
US7996894B1 (en) * | 2005-02-15 | 2011-08-09 | Sonicwall, Inc. | MAC address modification of otherwise locally bridged client devices to provide security |
US8621577B2 (en) | 2005-08-19 | 2013-12-31 | Samsung Electronics Co., Ltd. | Method for performing multiple pre-shared key based authentication at once and system for executing the method |
DE112006003105T5 (en) * | 2005-11-15 | 2008-10-09 | Credant Technologies, Inc., Addison | System and method for the secure, transparent and continuous synchronization of access credentials in any system of a third party |
KR100729729B1 (en) * | 2005-12-10 | 2007-06-18 | 한국전자통신연구원 | authentication device and method of access point in wireless portable internet system |
KR100790495B1 (en) * | 2006-03-07 | 2008-01-02 | 와이즈와이어즈(주) | Authentication Method, System, Server and Recording Medium for Controlling Mobile Communication Terminal by Using Encryption Algorithm |
DE102007016117A1 (en) * | 2007-04-03 | 2008-10-16 | Siemens Ag | Method and system for providing a REL token |
JP4928364B2 (en) * | 2007-06-25 | 2012-05-09 | 日本電信電話株式会社 | Authentication method, registered value generation method, server device, client device, and program |
WO2009001447A1 (en) * | 2007-06-27 | 2008-12-31 | Fujitsu Limited | Authentication method, authentication system, authentication device, and computer program |
KR100924315B1 (en) * | 2007-11-16 | 2009-11-02 | 넷큐브테크놀러지 주식회사 | Authentification system of wireless-lan with enhanced security and authentifiaction method thereof |
KR101065326B1 (en) * | 2009-08-06 | 2011-09-16 | 국방과학연구소 | Method for authenticating the user of web service using physical network address on intranet |
KR101133210B1 (en) * | 2010-05-22 | 2012-04-05 | 오중선 | Mobile Authentication System and Central Control System |
WO2014069783A1 (en) * | 2012-10-31 | 2014-05-08 | 삼성에스디에스 주식회사 | Password-based authentication method, and apparatus for performing same |
KR101493214B1 (en) | 2012-10-31 | 2015-02-24 | 삼성에스디에스 주식회사 | Method for password based authentication and apparatus executing the method |
KR101483901B1 (en) * | 2014-01-21 | 2015-01-16 | (주)이스트소프트 | Intranet security system and method |
US9674203B2 (en) * | 2015-03-16 | 2017-06-06 | International Business Machines Corporation | File and bit location authentication |
CN110831003B (en) * | 2018-08-13 | 2023-10-13 | 广东亿迅科技有限公司 | Authentication method and system based on WLAN flexible access network |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1081895A1 (en) * | 1999-09-03 | 2001-03-07 | Intel Corporation | Secure wireless local area network |
EP1134929A1 (en) * | 2000-03-17 | 2001-09-19 | Lucent Technologies Inc. | Secure mutual network authentication and key exchange protocol |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6766454B1 (en) * | 1997-04-08 | 2004-07-20 | Visto Corporation | System and method for using an authentication applet to identify and authenticate a user in a computer network |
US6539479B1 (en) * | 1997-07-15 | 2003-03-25 | The Board Of Trustees Of The Leland Stanford Junior University | System and method for securely logging onto a remotely located computer |
US6282575B1 (en) * | 1997-12-11 | 2001-08-28 | Intel Corporation | Routing mechanism for networks with separate upstream and downstream traffic |
US20020156708A1 (en) * | 1998-12-30 | 2002-10-24 | Yzhak Ronen | Personalized internet server |
US6393484B1 (en) * | 1999-04-12 | 2002-05-21 | International Business Machines Corp. | System and method for controlled access to shared-medium public and semi-public internet protocol (IP) networks |
PL354839A1 (en) * | 1999-05-21 | 2004-02-23 | Ibm | Method and apparatus for initializing secure communications among, and for exclusively pairing wireless devices |
US6396484B1 (en) * | 1999-09-29 | 2002-05-28 | Elo Touchsystems, Inc. | Adaptive frequency touchscreen controller using intermediate-frequency signal processing |
JP2001211171A (en) * | 2000-01-28 | 2001-08-03 | Advantest Corp | Device and method for equipment authentication and recording medium with storing authentication program |
KR20010083377A (en) * | 2000-02-11 | 2001-09-01 | 박순규 | User-Server Identity Authentication Using System Information |
FI111119B (en) | 2000-05-26 | 2003-05-30 | Radionet Oy Ab Ltd | Method and equipment for data transfer |
JP2001346257A (en) | 2000-06-01 | 2001-12-14 | Akesesu:Kk | Security system for portable wireless terminal, portable wireless terminal, and recording medium for recording program for security |
MY134895A (en) * | 2000-06-29 | 2007-12-31 | Multimedia Glory Sdn Bhd | Biometric verification for electronic transactions over the web |
US20020075844A1 (en) * | 2000-12-15 | 2002-06-20 | Hagen W. Alexander | Integrating public and private network resources for optimized broadband wireless access and method |
JP4390122B2 (en) * | 2001-03-14 | 2009-12-24 | 富士通株式会社 | User authentication system using biometric information |
KR100438155B1 (en) * | 2001-08-21 | 2004-07-01 | (주)지에스텔레텍 | Wireless local area network sytem and method for managing the same |
US7487535B1 (en) * | 2002-02-01 | 2009-02-03 | Novell, Inc. | Authentication on demand in a distributed network environment |
-
2002
- 2002-03-16 KR KR1020020014276A patent/KR100883648B1/en not_active IP Right Cessation
-
2003
- 2003-02-14 CN CNB031044476A patent/CN1206838C/en not_active Expired - Fee Related
- 2003-02-14 JP JP2003035865A patent/JP3863852B2/en not_active Expired - Fee Related
- 2003-02-14 DE DE60313910T patent/DE60313910T2/en not_active Expired - Fee Related
- 2003-02-14 EP EP03250931A patent/EP1345386B1/en not_active Expired - Lifetime
- 2003-03-10 US US10/383,729 patent/US20030177350A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1081895A1 (en) * | 1999-09-03 | 2001-03-07 | Intel Corporation | Secure wireless local area network |
EP1134929A1 (en) * | 2000-03-17 | 2001-09-19 | Lucent Technologies Inc. | Secure mutual network authentication and key exchange protocol |
Non-Patent Citations (3)
Title |
---|
ABOBA B ET AL: "Secure Remote Password (SRP)" SRP, November 2001 (2001-11), XP002249354 Retrieved from the Internet: <URL:http://grouper.ieee.org/groups/802/11 /Documents/DocumentHolder/1-524.zip> [retrieved on 2003-07-29] * |
THOMAS WU: "The Secure Remote Password Protocol" COMPUTER SCIENCE DEPARTMENT STANFORD UNIVERSITY, [Online] 22 November 1997 (1997-11-22), XP002251154 Retrieved from the Internet: <URL:http://srp.stanford.edu/ndss.html> [retrieved on 2003-08-13] * |
YOUNG KIM: "802.11b Wireless LAN Authentication, Encryption, and Security" MICROSOFT CORPORATION, [Online] 31 May 2001 (2001-05-31), XP002250118 Retrieved from the Internet: <URL:http://www.columbia.edu/itc/ee/e6951/ 2002spring/Projects/CVN/report5.pdf> [retrieved on 2003-08-04] * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2004224971B2 (en) * | 2003-11-07 | 2008-11-13 | Siemens Aktiengesellschaft | A method of authentication via a secure wireless communication system |
GB2407939A (en) * | 2003-11-07 | 2005-05-11 | Siemens Ag | Authentication in a secure wireless communication system |
GB2407939B (en) * | 2003-11-07 | 2006-01-11 | Siemens Ag | A method of authentication via a secure wireless communication system |
GB2407940A (en) * | 2003-11-07 | 2005-05-11 | Siemens Ag | Providing secure authentication data in a wireless network |
US7743405B2 (en) | 2003-11-07 | 2010-06-22 | Siemens Aktiengesellschaft | Method of authentication via a secure wireless communication system |
CN100450137C (en) * | 2003-11-12 | 2009-01-07 | 华为技术有限公司 | Realizing method for mobile phone user to access to internet |
EP1635528A1 (en) * | 2004-09-13 | 2006-03-15 | Alcatel | A method to grant access to a data communication network and related devices |
GB2432090A (en) * | 2004-09-30 | 2007-05-09 | Intel Corp | Method, apparatus and system for maintaining a persistent wireless network connection |
GB2432090B (en) * | 2004-09-30 | 2009-02-11 | Intel Corp | Method, apparatus and system for maintaining a persistent wireless network connection |
KR100920497B1 (en) * | 2004-09-30 | 2009-10-08 | 인텔 코포레이션 | Method, apparatus and system for maintaining a persistent wireless network connection |
WO2006039178A1 (en) * | 2004-09-30 | 2006-04-13 | Intel Corporation | Method, apparatus and system for maintaining a persistent wireless network connection |
WO2006040424A1 (en) * | 2004-10-07 | 2006-04-20 | France Telecom | Method for authenticating a user, device therefor, and signalling server |
FR2876521A1 (en) * | 2004-10-07 | 2006-04-14 | France Telecom | METHOD FOR AUTHENTICATING A USER, DEVICE USING SUCH A METHOD, AND SIGNALING SERVER |
EP1724974A1 (en) * | 2005-05-16 | 2006-11-22 | Alcatel | Apparatus and associated method, for providing communication access to a communication device at a network access port |
US8010994B2 (en) | 2005-05-16 | 2011-08-30 | Alcatel Lucent | Apparatus, and associated method, for providing communication access to a communication device at a network access port |
Also Published As
Publication number | Publication date |
---|---|
US20030177350A1 (en) | 2003-09-18 |
JP3863852B2 (en) | 2006-12-27 |
EP1345386A3 (en) | 2004-02-04 |
KR100883648B1 (en) | 2009-02-18 |
DE60313910T2 (en) | 2008-01-17 |
CN1206838C (en) | 2005-06-15 |
EP1345386B1 (en) | 2007-05-23 |
JP2003289301A (en) | 2003-10-10 |
CN1445963A (en) | 2003-10-01 |
KR20030075224A (en) | 2003-09-26 |
DE60313910D1 (en) | 2007-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1345386B1 (en) | Method of controlling network access in wireless environment and recording medium therefor | |
US8726022B2 (en) | Method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link securely | |
EP1422875B1 (en) | Wireless network handoff key | |
US9009479B2 (en) | Cryptographic techniques for a communications network | |
JP4615892B2 (en) | Performing authentication within a communication system | |
US8515078B2 (en) | Mass subscriber management | |
EP1430640B1 (en) | A method for authenticating a user in a terminal, an authentication system, a terminal, and an authorization device | |
CN1711740B (en) | Lightweight extensible authentication protocol password preprocessing | |
US20030084287A1 (en) | System and method for upper layer roaming authentication | |
US20090100262A1 (en) | Apparatus and method for detecting duplication of portable subscriber station in portable internet system | |
JP2004072682A (en) | Radio connection method, radio connection system and access point apparatus | |
CN1444386A (en) | Safe inserting method of wide-band wireless IP system mobile terminal | |
US8788821B2 (en) | Method and apparatus for securing communication between a mobile node and a network | |
JP3792648B2 (en) | Wireless LAN high-speed authentication method and high-speed authentication method | |
JP4550759B2 (en) | Communication system and communication apparatus | |
WO2003047294A1 (en) | Authentication, authorisation and accounting for a roaming user terminal | |
US20050144459A1 (en) | Network security system and method | |
EP1622333A1 (en) | Method and apparatus for minimally onerous and rapid authentification | |
Williams | The IEEE 802.11 b security problem. 1 | |
CN1301608C (en) | Method for implementing peer-to-peer WLAN with center certification | |
EP1722503A1 (en) | Method used by an access point of a wireless LAN and related apparatus | |
WO2001037477A1 (en) | Cryptographic techniques for a communications network | |
Pastrone | Fast Authentication in Heterogeneous Wireless Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20030312 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO |
|
AKX | Designation fees paid |
Designated state(s): DE FI FR GB IT SE |
|
17Q | First examination report despatched |
Effective date: 20050107 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FI FR GB IT SE |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 60313910 Country of ref document: DE Date of ref document: 20070705 Kind code of ref document: P |
|
REG | Reference to a national code |
Ref country code: SE Ref legal event code: TRGR |
|
ET | Fr: translation filed | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20080226 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20090123 Year of fee payment: 7 Ref country code: FI Payment date: 20090212 Year of fee payment: 7 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20090211 Year of fee payment: 7 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IT Payment date: 20090212 Year of fee payment: 7 Ref country code: SE Payment date: 20090206 Year of fee payment: 7 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20090213 Year of fee payment: 7 |
|
EUG | Se: european patent has lapsed | ||
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20100214 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20101029 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100214 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100301 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100901 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100214 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100214 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20100215 |